{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:40:17Z","timestamp":1763343617958,"version":"3.45.0"},"reference-count":25,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064471","type":"journal-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T03:22:27Z","timestamp":1745896947000},"page":"1279-1305","source":"Crossref","is-referenced-by-count":1,"title":["FSMMTD: A Feature Subset-Based Malicious Traffic Detection Method"],"prefix":"10.32604","volume":"84","author":[{"given":"Xuan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yafei","family":"Song","sequence":"additional","affiliation":[]},{"given":"Xiaodan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"3211","DOI":"10.1007\/s11831-020-09496-0","article-title":"A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges","volume":"28","author":"Thakkar","year":"2021","journal-title":"Arch Comput Methods Eng"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"4245","DOI":"10.1007\/s11831-023-09943-8","article-title":"A review on challenges and future research directions for machine learning-based intrusion detection system","volume":"30","author":"Thakkar","year":"2023","journal-title":"Arch Comput Methods Eng"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"123417","DOI":"10.1016\/j.eswa.2024.123417","article-title":"Recognition of high-resolution range profile sequence based on TCN with sequence length-adaptive algorithm and elastic net regularization","volume":"248","author":"Wang","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref4","first-page":"1","article-title":"Image synthesis under limited data: a survey and taxonomy","volume":"2025","author":"Yang","year":"2025","journal-title":"Int J Comput Vis"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"112908","DOI":"10.1016\/j.asoc.2025.112908","article-title":"An Advanced Ensemble Framework for defending against obfuscated Windows, Android, and IoT malware","volume":"173","author":"Vasan","year":"2025","journal-title":"Appl Soft Comput"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"110299","DOI":"10.1016\/j.engappai.2025.110299","article-title":"Self-supervised contrastive representation learning for classifying Internet of Things malware","volume":"150","author":"Wang","year":"2025","journal-title":"Eng Appl Artif Intell"},{"key":"ref7","series-title":"4th International Conference on Computer Engineering and Application (ICCEA)","first-page":"216","article-title":"TransIDS: a transformer-based approach for intrusion detection in internet of things using label smoothing","author":"Wang","year":"2023 Apr 7\u20139"},{"key":"ref8","series-title":"31st Conference on Neural Information Processing Systems (NeurIPS)","article-title":"Attention is all you need","author":"Vaswani","year":"2017 Dec 4\u20139"},{"key":"ref9","series-title":"Conference on Language Modeling (COLM 2024)","article-title":"Mamba: linear-time sequence modeling with selective state spaces","author":"Gu","year":"2024 Oct 7\u20139"},{"key":"ref10","series-title":"41st International Conference on Machine Learning (ICML 2024)","first-page":"1","article-title":"Vision mamba: efficient visual representation learning with bidirectional state space model","author":"Zhu","year":"2024 Jul 15\u201320"},{"key":"ref11","series-title":"41st International Conference on Machine Learning (ICML 2024)","first-page":"1","article-title":"Transformers are SSMs: generalized models and efficient algorithms through structured state space duality","author":"Dao","year":"2024 Jul 15\u201320"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1186\/s40537-024-00994-7","article-title":"Shielding networks: enhancing intrusion detection with hybrid feature selection and stack ensemble learning","volume":"11","author":"Alsaffar","year":"2024","journal-title":"J Big Data"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1186\/s40537-021-00448-4","article-title":"Intrusion detection systems using long short-term memory (LSTM)","volume":"8","author":"Laghrissi","year":"2021","journal-title":"J Big Data"},{"key":"ref14","series-title":"NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","article-title":"E-GraphSAGE: a graph neural network based intrusion detection system for IoT","author":"Lo","year":"2022 Apr 25\u201329"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/TIFS.2023.3318962","article-title":"MCRe: a unified framework for handling malicious traffic with noise labels based on multidimensional constraint representation","volume":"19","author":"Yuan","year":"2023","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3770","DOI":"10.1109\/JIOT.2021.3100063","article-title":"IoT malware classification based on lightweight convolutional neural networks","volume":"9","author":"Yuan","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1016\/j.aej.2024.08.061","article-title":"Class imbalanced data handling with cyberattack classification using Hybrid Salp Swarm Algorithm with deep learning approach","volume":"106","author":"Alabduallah","year":"2024","journal-title":"Alex Eng J"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"102994","DOI":"10.1016\/j.scs.2021.102994","article-title":"A new distributed architecture for evaluating AI-based security systems at the edge: network TON_IoT datasets","volume":"72","author":"Moustafa","year":"2021","journal-title":"Sustain Cities Soc"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1109\/JIOT.2021.3085194","article-title":"ToN_IoT: the role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets","volume":"9","author":"Booij","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref20","series-title":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","first-page":"848","article-title":"Federated TON_IoT windows datasets for evaluating AI-based security applications","author":"Moustafa","year":"2021 Dec 29\u2013Jan 1"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"103041","DOI":"10.1016\/j.scs.2021.103041","article-title":"IoTBoT-IDS: a novel statistical learning-enabled botnet detection framework for protecting networks of smart cities","volume":"72","author":"Ashraf","year":"2021","journal-title":"Sustain Cities Soc"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1186\/s40537-024-00892-y","article-title":"Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning","volume":"11","author":"Li","year":"2024","journal-title":"J Big Data"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1186\/s13635-019-0098-y","article-title":"Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation","volume":"2019","author":"Sharma","year":"2019","journal-title":"EURASIP J Inf Secur"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"2373","DOI":"10.3390\/app10072373","article-title":"Investigation of dual-flow deep learning models LSTM-FCN and GRU-FCN efficiency against single-flow CNN models for the host-based intrusion and malware detection task on univariate times series data","volume":"10","author":"\u010ceponis","year":"2020","journal-title":"Appl Sci"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"3137","DOI":"10.3390\/math9233137","article-title":"XCM: an explainable convolutional neural network for multivariate time series classification","volume":"9","author":"Fauvel","year":"2021","journal-title":"Mathematics"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_64471\/TSP_CMC_64471.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:35:56Z","timestamp":1763343356000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61765"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":25,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064471","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}